Fci - Buted
Fci - Buted
Fci - Buted
1759, USA: The US CONGRESS created the office of the GENERAL AND REVENUE
CUTTER SERVIC
• This is the first organized federal law enforcement and investigative effort made by
the US government.
1833, ENGLAND:
• The Scotland Yard employed the first undercover officer
USA:
• First daytime paid police department was established in Philadelphia, USA.
1965, USA: Office of Law Enforcement Assistance (forerunner of the Law Enforcement
Assistance Administration – LEAA)
• was established to fund and coordinate administration, research and training in
criminal justice.
1. Right to remain silent with explanation that anything that he might say may be used
against him in the court of the law;
2. Right to talk to a lawyer, a relative, or a friend, and have a lawyer ready and a friend
present while he is being questioned; and
3. Right to the appointment of a lawyer if he cannot afford one.
Criminal Investigation- is an art that deals with the identity and location of the offender
and prove his guilt in a criminal proceeding.
Criminal Investigation- it is the systematic method of inquiry that is more a science than
an art. The logic of scientific method must however, be supplemented by the investigator's
initiative and resourcefulness. The sequences of the investigation should be regarded by
scientific, operating framework that requires improvising on the part of the investigator.
Criminal Investigation
Is an Art– based on intuition, felicity of inspiration or by chance;
and a Science – based on adequate professional preparation and abundance of certain
qualities
Special Crime Investigation- deals with the study of major crimes based on the
application of special investigative techniques. It is also the study concentrates more on
physical evidence; it’s collection, handling, identification and preservation in coordination
with the various criminalists in the crime laboratory.
Investigator- is the person who is charged with the duty of carrying out the objectives of
criminal investigation. He is an individual who gathers documents and evaluates facts
about crime
Criminal investigation can be based on the following approaches considering the type of
crime and the manner how it was collected such that:
QUALITIES OF AN INVESTIGATOR
1. Good communication - this refers to the capability of the investigator to interact both
in written and oral. This means that they can do effective interview either to the witness
or suspect as well as be able to write a written report when required to do so. Effective
interview means a fruitful interaction between the investigator and the people as he
gathers information without language problem.
2. Active listener - this refers to the ability of the investigator to attentively hear the
testimony given by a witness and be able to identify hearsay statements or false
statements. Hearsay are those statements made by the person who does not witness
the actual commission of the crime while false statements are those statements which
are purely fictitious and are invented only by the witness.
3. Critical thinking - this refers to the analytical skills of the investigator while he
formulates judgment based on the testimonies given by witnesses and evidences
gathered in the course of investigation.
4. Work under pressure - this refers to the capacity of the investigator to go through the
investigation process despite of obstacles and hindrances that he may encounter such
as hut not limited to lack of resources inadequate investigative leads and clues and
others.
Investigative leads refer to the information gathered from people specially those who are
within the immediate area where the crime took place while clues refer to the pieces of
signs and traces which helps in identifying perpetrators.
6. Integrity - this refers to the honor and honesty of the investigator in solving the case
and avoid unethical issues that will discredit his image.
7. Knowledge about rules on evidence - this refers to the knowledge of the investigator
about evidence handling which includes but not limited to preservation, marking,
tagging, packaging, and the requirements as to how such evidence will be admitted in
court during presentation.
CRIME SCENE
A venue or place where the alleged crime/incident/event has been committed.
According to Location
1. Indoor Crime Scene – affords the crime scene protection from weather and allows
investigators to take time and process the scene in a slow and methodical manner,
without concern for weather influences.
2. Outdoor crime scene – most vulnerable to weather condition and present more
problems
3. Continuing/Mixed crime scenes – from indoor to outdoor and/or vice versa
4. Special Location – the most difficult to handle because of its nature, it needs
special support resources to process: vehicle, airplane, septic tank
1. First Responder
Are members of the police, military, fire, medical teams, and other colunteer
organizations who are expected to be the first to respond to calls for assistance in
cases of incidents.
2. Investigator-on-case
Refers to the duty investigator duly assigned or designated to conduct the inquiry
of the crime by following a systematic set of procedure and methodologies for the
purpose of identifying witnesses, recovering evidence, arresting and prosecuting
perpetrators.
A. If in serious condition
• Bring the victim immediately to the nearest hospital using emergency
services
• Photograph and make a sketch of the victim (if the victim is dead)
• Get the dying declaration, if necessary (ask 3 questions)
i. What is your name and address?
ii. Who did this to you?
iii. Do you think the wounds you received are fatal?
B. Recording
The investigator begins the process of recording pertinent facts and details
of the investigation the moment he arrives at the crime scene.
G. Preserving of Evidence
It is the investigator’s responsibility to ensure that every precaution is
exercised to preserve the evidence in the state in which it was
recovered/obtained until it is released to evidence custodian
H. Releasing of Evidence
All collected evidence can only be released upon order of the court or
prosecutor.
I. Chain of Custody
A list of all persons who came into possession of an item of evidence,
continuity of possession, or the chain of custody, must be established
whenever evidence is presented in court as an exhibit.
SKETCH
Rough Sketch – It is made by the investigator at the crime scene which is full of important
details. This is used as the basis for the finished sketch.
Finished Sketch – This is sketch with a scale of proportion and drawn by a draftsman.
The rough sketch and the finished sketch are for courtroom presentation.
ELEMENTS OF SKETCH
1. Title – includes the basic information regarding the case as the nature of the crime,
the time and date of crime incident, and the location of the crime.
2. Measurement – this pertains to the dimension and the distance of the relative
object to one another
3. Essential Items – refers to the pieces of physical evidence found at the crime scene
4. Legend – refers to the use of words or numbers to represent an item in the crime
scene
5. Compass Direction – refers to the north direction from when the sketch was drawn.
6. Scale of proportion – representation of the sketch to the actual size of the scene.
TYPE OF SKETCH
1. Floor plan or bird’s eye view – drawn from above
2. Elevation sketch – drawn to show the given side of an area
3. Exploded view sketch – drawn to show the relationship or order of the whole parts
4. Cross-projection sketch – a type of sketch wherein the ceiling and/or walls are
flattened all out in the ground.
CRIME RECONSTRUCTION
It is defined as the scientific ability of investigators to make useful observations of physical
evidence in the crime scene through a logical approach in theorizing as to how the crime
was committed.
Crime Scene Reenactment – process of reenacting and portraying the crime incident
based on their previous knowledge regarding the event by having the offender, victim, or
witness to play such role
Crime Scene Recreation – process of substituting necessary items or actions at the crime
scene through the use of what is documented or with the aid of investigator’s log.
Witness – is defined as any person who have seen or knowledge regarding the
commission or the crime.
CLASSFICATION OF WITNESS
1. Prosecution witness - refers to any person brought before trial to offer testimony in
favor for the prosecution and is used to add incriminatory evidence to the accused.
2. Defense witness - refers to any person who is brought before trial to strengthen
the alibi of the defense and to disprove the charge of the prosecution.
3. Character witness - refers to any person who offers a testimony in line with the
character reputation of some other person which will then serve at some point as
to whether or not the testimony of that person will be given credit or not.
4. Eyewitness - refers to any person who has seen the actual commission of the
crime either whole or only part of its commission.
5. Child witness - refers to young individual who offers a testimony concerning a
crime.
6. Dumb witness - these are those witnesses who by reason of some mental faculty
are unable to provide an accurate detail regarding the crime which is typically
common among uneducated individual.
7. Honest witness - these are those witnesses who cooperate and avoid exaggeration
or falsehood in providing testimonies concerning the crime.
8. Fearful witness - these are those persons who are afraid of being involved in the
prosecution of the accused or simply shy to face the open court.
9. Egocentric witness - refers to a witness who is prone to exaggeration of the things
he had observed and may attempt to add facts which are not part of the real
scenario.
10. Hostile witness - these are those witnesses who are uncooperative and do not
wish to provide information necessary for the prosecution of the case.
11. Suspicious witness - are individual witnesses who are doubtful about the true
intention of the investigators or the police as a whole
Under the Revised Rules of Court, the law further classify witness as either:
1. Ordinary witness - these are those witness who may be allowed to testify regarding
the following:
a. About the identity of the person whom he had knowledge;
b. Handwriting of the person of which he had familiarity; and
C. Mental sanity of the person whom he had acquainted.
2. Expert witness - are those witness who by reason of their knowledge, skills,
training or experience may be allowed by the court to give their opinion.
ARREST
Legally, the Rules of Court (Section 1, Rule 113) define arrest as the taking of person into
the custody of law in order that he may bound to answer for the commission of offense.
Warrant of Arrest is defined as a document from court ordering and directing any law
enforcer to apprehend and detain any person whose name will appear in the warrant for
him to answer matters regarding the commission of a crime. Any person suspected to
have committed a crime can only be lawfully arrested after securing a warrant.
Warrantless arrest
is defined as the arrest made by any law enforcer without the benefit of a warrant.
1. That the person to be arrested is about to commit, actually committing, or have just
committed an act to which the law defines it as a crime in the presence of the
person who will make the arrest (In Flagrante Delicto);
2. That the person to be arrested have committed an act to which the law defines it
as a crime and the person making the arrest have probable cause that the same
person is probably guilty of a crime. Probable cause simply means as a reasonable
bases to establish a well- founded belief that the person may have committed an
act to which the law defines it as a crime (Hot Pursuit) and
3. That the person to be arrested is one who escaped from penal confinement
(Escapee).
Furthermore, inquest proceeding will be done if the person was arrested without the
benefit of the warrant. This is conducted to ensure that the arrest made is legal and in
accordance with the law. Inquest is defined as the informal and summary investigation
conducted by public prosecutor in a criminal case involving persons arrested without the
benefit of a warrant to determine if the person so arrested should remain under custody
and be charged accordingly.
Execution of Warrant
After a warrant has been issued by the honorable court, any law enforcer directed to
cause its execution shall exhaust all the remedies to arrest the person whose name
appears in the warrant.
Execution of a warrant simply means as carrying out the duty to find the person whose
name was written in the warrant and cause his arrest and detention.
However, the person making the arrest shall proceed with the arrest of the person even
without informing him of the cause of arrest or that a warrant was issued for him to be
arrested provided that either of the following is present:
1. The person flees;
2. The person forcibly resisted; or
3. It will hamper successful arrest of the person.
Moreover, if the person whose name appeared in the warrant cannot be located or traced
within 10 working days upon its receipt, the law enforcer task to execute the warrant shall
make a report to the judge who issue the same, explaining the reason/s for the failure to
arrest the person within the time given by the court.
Any person arrested and brought before the custody of the law is presumed innocent until
proven to be guilty. Thus, a person has the same right as any ordinary individual in order
to protect the interest of an ordinary individual as well as prevent any abuses from law
enforcers. These rights must be observed as any violations may result to the dismissal of
the case.
These rights provided by the state was originally founded in the case of Ernesto Miranda
vs. the State of Arizona such that the Court dropped his conviction for kidnapping and
rape for failure of police officers conducting the investigation to inform and recite his legal
rights prior to confession during custodial investigation.
In Philippines, the right of the person arrested is originally defined under the Bill of Rights
of the 1987 Philippine Constitution (Section 12, Article IIl) such that any person lawfully
arrested and under investigation for the commission of a crime shall have the following
rights
1. Right to remain silent;
2. Right to have independent and competent counsel, preferably of his own
choice; and
3. Right to know the nature and the cause of accusation against the person
accused.
In addition to the above rights, the state enacted the statutory law Republic Act 7438
which provides further the process of obtaining a confession to any person detained or
under custodial such that:
In like manner, any extrajudicial confession made by the person arrested or detained shall
be in writing and signed in the presence of his counsel. Take note, extra judicial
confession is a confession made by an arrested or detained person while under the
custody of law and is done outside the court.
A search warrant is legally defined under the Rules of Court (Section 1, Rule 126) as an
order in writing issued in the name of the People of the Philippines, signed by the judge
and directed to a peace officer, commanding him to search for personal property
described therein and bring it before the court.
Application and Issuance of Search Warrant
Any police officer can request for the issuance of a warrant provided that there is a
probable cause as a strong basis for its issuance. Probable cause means that there is a
strong ground that a crime has been committed or about to be committed and the
proceeds, fruit of the crime or property that will be used in committing the crime can be
found and located in the place so described in the warrant. Any police officer can secure
the warrant from:
1. The court that has the territorial jurisdiction of the crime;
2. For compelling reason, any court within the judicial region where the crime was
committed if the place of the commission of the crime is known; or
3. Any court within the judicial region where the warrant shall be enforced.
4. However, if that has been filed already, the application shall be made in the court
where the criminal action is pending.
The search warrant shall be issued for the search and seizure of the personal property
which includes the following:
1. Subject of the offense;
2. Stolen or embezzled and other proceeds, or fruits of the offense; or
3. Used or intended to be used as the means of committing an offense.
The warrant shall be valid only for ten (10) days from the date of its issuance and no
search shall be made except:
1. Lawful occupant is present;
2. Any member of his family; or
3. Presence of at least two witnesses of sufficient age and discretion residing in the
same locality.
In general, all search shall be made during daytime unless specified to be served at any
time of the day or night. Thereafter, the officer seizing the property shall give a detailed
receipt to the lawful occupant, in the presence of at least two witnesses of sufficient age
and discretion residing in the same locality.
Warrantless search is defined as the search and seizure of personal property based on
probable cause made by a police officer without a warrant. This is true in cases of exigent
circumstance.
Exigent circumstance
refers to a situation whereby securing a warrant would make it less practical or useless.
The following are examples of exigent circumstances whereby a valid warrantless search
and seizure is applicable.
1. Search Incidental to Lawful Arrest
Search incidental to a lawful arrest is defined as the search and seizure of property made
by any police officer upon a valid arrest. The search and seizure of personal property are
allowed by law provided that the arrest was made by virtue of a valid warrantless arrest
(in flagrante delicto, hot pursuit or escapee).
A search warrant is legally defined under the Rules of Court (Section 1, Rule 126) as an
order in writing issued in the name of the People of the Philippines, signed by the judge
and directed to a peace officer, commanding him to search for personal property
described therein and bring it before the court.
The search warrant shall be issued for the search and seizure of the personal property
which includes the following:
4. Subject of the offense;
5. Stolen or embezzled and other proceeds, or fruits of the offense; or
6. Used or intended to be used as the means of committing an offense.
Warrantless search is defined as the search and seizure of personal property based on
probable cause made by a police officer without a warrant. ]
3. Search Incidental to Lawful Arrest
Search incidental to a lawful arrest is defined as the search and seizure of property made
by any police officer upon a valid arrest. The search and seizure of personal property are
allowed by law provided that the arrest was made by virtue of a valid warrantless arrest
(in flagrante delicto, hot pursuit or escapee).
Cybercrime
• is a terminology that refers to all crimes committed through cyberspace done with
the aid of a computer or any digital devices capable of sending, receiving,
transmitting, recording or storing computer data.
Cyberspace
• refers to communications made through digital devices in the virtual environment.
Virtual environment meaning, the communication is not done physically but rather
with the aid of digital technology.
Computer data
• may refer to anything stored in the memory of the computer software. It could either
be text, drawing, images, video, audio or any form of communication.
Digital investigation
• is defined as the process undertaken by the forensic computer investigator and
forensic computer examiner to uncover the elements of the offense committed
which are directly or indirectly contained in the digital devices and which are
necessary for the prosecution of criminal charges.
Digital device
• is a generic term referring to all devices capable of performing multiple functions
such as storing, sending, and receiving electronic data.
Electronic data
• simply means as any data or information stored through electronic means.
In line with cybercrime, this court warrant refers to an order in writing issued in the name
of the People of the Philippines, signed by the judge, upon application of law enforcement
authorities to:
1. Issue an order requiring any person or service provider to disclose or submit
subscriber's information, traffic data or relevant data in his/her possession or
control (Warrant to Disclose of Computer Data);
2. Listen, record, monitor or surveillance the content of communications (Warrant
to Interception of Computer Data);
3. Search a particular place, seize and examine computer data and all other items
related thereto (Warrant to Search, Seized and Examine Computer Data); and.
4. Obtain computer data from computer device or computer system if they are
possessed by virtue of a lawful warrantless arrest (Warrant to Examine
Computer Data).
The effectivity of all warrants mentioned shall not exceed ten (10) days from the date of
its issuance and may be extended by the court for a period not exceeding ten (10) days
from the expiration of the original period and upon justifiable reasons only.
Warrant to Intercept Computer Data is an order in writing issued in the name of the
People of the Philippines, signed by the judge, upon application of law enforcement
authorities, authorizing the batter to carry out any or all of the following activities:
1. Listening to;
2. Recording;
3. Monitoring; or
4. Surveillance of the content of communications, including procuring of the
content of computer data, either directly, through access and use of a computer
system or indirectly, through the use of electronic eavesdropping or tapping
devices, at the same time that the communication is occurring.
Warrant to Search, Seize, and Examine Computer Data is an order in writing issued in
the name of the People of the Philippines, signed by the judge, upon application of law
enforcement authorities, authorizing the latter to search, seize, and examine computer
data and all other related items thereto.
Take note that, after all items seized by virtue of a Warrant to Disclose Computer Data
(DCD), Warrant to Intercept Computer Data (WICD), or even digital devices obtained as
a result of search and seizure after a lawful arrest, shall not be examined unless there is
a Warrant to Examine Computer Data (WECD).
Definition of Intelligence
Intelligence
A product created through the process of planning, directing, collecting, collating, and
analyzing data, for dissemination as usable information that typically assesses events,
locations of adversaries, to allow the appropriate deployment of resources to reach a
desired outcome.
In the Military parlance, it is the product resulting from the collection, evaluation,
analysis, integration, and interpretation of all available information which concerns one or
more aspect of foreign nations or are areas of operations and which is immediately or
potentially significant to planning.
As an organization
➔ an institution composed of persons who pursue a special kind of knowledge for the
purpose of planning the collection of information, processing, and dissemination of
intelligence relating to military/police operations.
Objectives of counterintelligence
• to protect information against espionage (the use of spying or spies to gather
secret info)
• to protect personnel against subversion (an action or activity intended to
undermine or overthrow a government or institution)
• to protect installations against sabotage, the deliberate destruction of property,
equipment or efforts of another
Importance of Counterintelligence
• it reduces risk of officers in command positions
• it aids in achieving the element of surprise
• it increases the security of command
• it denies info to the enemy/ decrease the intel capacity of the enemy
Counterintelligence operation
1. Counter Human Intel (HUMINT) – seeks to overcome enemy attempts to use
human sources to collect information or to conduct sabotage and subversion which
includes CI special operations, liaison, counter security, and CI screening.
2. Counter Imagery Intel (IMINT) – includes action taken to determine enemy
SIGINT and related enemy weaknesses, capabilities, and activities. These actions
include surveillance radar, photo thermal and infrared systems.
3. Counter Signal Intel (SIGINT) – determine enemy SIGINT and related enemy
weaknesses, capabilities, and activities, assess friendly operations to identify
patterns, profiles and develop recommend and analyze counter measures.
2. Detection
• Personnel security investigation
• Document security
• Password and countersigns
• Reconnaissance
3. Deception
• Use of escape and evasion
• Dummy position
• Fabricated info
2. Collection of Information
It involves the systematic exploitation of sources by collection agency and
the delivery of information to proper intelligence unit.
3. Processing
It is the phase where information becomes intelligence. It involves
recording, evaluation and interpretation of information.
4. Dissemination
It is the timely conveyance of information by any suitable means to those
who need it.
PHASE 2 – COLLECTION
PURPOSE OF ELICITATION:
1. To acquire info which is impossible through other channel
2. To obtain info which although unclassified is not publicly known
3. To provide source info
4. To assist various individuals
B. CASING OR RECONNAISSANCE
Casing is the term used in the police organization while Reconnaissance is used in
military terms. It is the surveillance of a building place or area to determine its
suitability for intel use or its vulnerability in operations.
METHOD OF CASING
1. Personal Reconnaissance – the most effective method and will produce the most
info since you know just what you’re looking for.
2. Map Reconnaissance – it may not be sufficient but it can produce a certain amount
of usable information
3. Research – much info can be acquired through research
4. Prior information – your unit and other unit will have file report that they may provide
you with info
5. Hearsay – info usually gain by the person operating in the area and performing
casing job.
C. Surveillance
METHODS OF SURVEILLANCE
a. STATIONARY SURVEILLANCE – used when you know or suspect that a person
is at or will come to a known location when you suspect that stolen goods are to
be dropped or when informants have told you that a crime is going to be committed.
b. MOVING SURVEILLANCE/SHADOWING – simply the act of following a person
FORMS OF MOVING SURVEILLANCE
• Loose Tail – employed where a general impression of the subject’s habits and
associates is required
• Rough Shadowing – employed without special precautions. The subject may be
aware of the surveillance. It is employed when the subject is a material witness
and must be protected from harm or other undesirable influences.
• Close Tail – extreme precautions are taken against losing the subject is employed
where constant surveillance is necessary.
COVER – refers to the changing, forging, or falsifying agent’s real personality including
but not limited to things, location, job, and others that will be used in undercover
assignment.
COVER STORY – a biographical data through fiction that will portray the personality of
the agent he assumed; the scenario to cover up the operation
COVER SUPPORT: an agent assigned in target areas with the primary mission of
supporting the cover story.
TYPES OF COVER
1. Artificial – altering the background that will correspond to the operation
2. Multiple – includes different cover
3. Natural – actual or true background
4. Cover within a cover – use of secondary to justify existence
UNDERCOVER ASSIGNMENT – the process of determining the nature and extent of any
criminal activities in which a disguise, pretext cover and deception are employed to gain
the trust and confidence of the criminal organization.
INFORMATION NET – controlled group of people who together under the direction of
agent handler
INFORMERS AND INFORMANTS
1. Informants - any person who hands over information to the agents which is relevant
to the subject. The informant may openly give the information clandestinely and
choose to remain anonymous.
TYPES OF INFORMANTS
• Anonymous – unidentified or unknown information
• False informants – reveals information of no consequences, value or stuff
connected within
• Frightened informants – weakest link in criminal chain, motivated by anxiety
• Self – Aggrandizing – moves around the center of criminal delight in
surprising the police about bits of information
• Mercenary – information for sale needed something for exchange of
information
• Double-crosser – he wants to get more information from the police more
than he gives
• Women – most dangerous
• Legitimate – operate of business desire to give information for legitimate
• Competitor/Rival Elimination – purpose is to eliminate rivals or competitors
• Confidential – one who provides the investigator with confidential
information about a crime or about the actual or potential tendency of an
individual or group to commit a crime.
MOTIVES OF INFORMATIONS
• Vanity – conceited act/character of the criminal resulting to self-betrayal or
tantamount to guilt, gaining favorable attention and importance by the police
• Civic-mindedness – sense of duty and obligation to assist the police
• Fear – a person under an illusion of oppression by enemies or of other impending
danger
• Repentance – one who has a change of heart and wishes to report a crime that is
preying on his conscience
• Gratitude or gain – an expression of appreciation to obtain a privilege or an interest
in the welfare of his family during his detention
• Revenge – to settle a grudge due to settle a previous injury
• Jealousy – envious of the accomplishments or possession of another and wishes
to humiliate him.
• Renumeration – a person who informs solely for the pecuniary or other material
gain he is to receive.
2. Informers – refers to any person who provides information to the agents in a regular
basis regarding to the subject. They are either paid regularly or in case-to-case
basis.
2. Evaluation or Analysis
It is determining the pertinence, reliability of the source and accuracy of the
information; or examination of raw information to determine intelligence value.
Evaluation to determine:
B. Pertinence
C. Reliability
D. Credibility
ADMIRALTY SCALE
It is the general system used to evaluate information
Z- Documentary
3. Interpretation
It is establishing the meaning and significance of the information.
a. Analysis – done by shifting and isolating those elements that have
significance
b. Integration – combination of the elements stated in assessment
c. Deduction – conclusions from the theory developed, tested, and considered
valid.
PHASE 4 – DISSEMINATION AND USE
Considerations:
1. Timeliness – reach the user on time to be useful
2. Propriety – right user like national leaders or commanders
Methods of Dissemination
a. Conference
b. Operations order, oral, or written
c. Personal conduct
d. Memorandum, circulars, special orders, etc
e. Fragmentary orders from top to bottom of the command
f. Other report and intelligence documents
4. All printed photographs and exposed or printed films, still or moving; and
5. All productions of the foregoing for whatever purposes.
Security Officer- A properly trained and cleared individual who assist the chief of
the office in discharging the responsibilities of safeguarding classified document and
materials.
Custodian- A cleared individual charged with the responsibility of safeguarding
and accounting classified materials.
2. NAC
3. PBI
4. CBI
CRYPTOGRAPHY
An art or science of making, devising, and protecting codes and ciphers.
It is a science of preparing communication intended to be intelligible only to the person
possessing the key or method of developing the hidden meaning by crypto-analysis using
apparently incoherent text.
It includes the use of concealed messages, such as those hidden in otherwise innocent
text and those written in invisible ink, depend for their success on being unsuspected,
once they are discovered, they frequently offer little difficulty to decipherment.
CRYPTOGRAM – a.k.a cipher text, the product of enciphering process that usually
involves an algorithm and a key.
STEGANOGRAPHY – “concealed message”
• It deals with hidden or secret writing, relies on different ways to hide or disguise
writing
Codes
Words and phrases are represented by predetermined words, numbers, or symbols, and
are usually impossible to read without the key code book.
Ciphers – methods of transposing the letters of plain text message or to methods involving
the substitution of the letters or symbols for the original letters of a message, and to
various combinations of such methods, all according to prearranged system.
TYPES OF CODE:
1. JARGON CODE – a particular arbitrary phrase corresponds to a particular
predefined message that may not, in fact shouldn’t have, anything to do with the
jargon code phrase
For example:
Code: The nightingale sings at dawn
Plaintext: The supply drop will take place at 0100 hours tomorrow
Wherein:
Nightingale = supply
Sings – drop
Dawn = 0100 hrs
SUBSTITUTION CIPHERS
1. Simple Substitution Ciphers – a particular letter or symbol is substituted for each
number.
Represent the entire cipher by two rows of letter. These rows are called as
LOOKUP TABLE
EXAM = HADP
One way to transpose this message is for Alice to write in the words vertically in
five rows without any spaces as follows:
Meetm
Enear
Thecl
Ockto
Werat
Twelv
Emidn
Ightt
Onite
METOWWTEIOENHCEWMGNEEEKREIHITACTALDTTMRLOTVNTE
For example:
CIPHER: I will do it. If not today, then trust me. Signed smith
PRE-DETERMINED INSTRUCTION: copy out every third word)